This project is a demonstration of advanced DLL hijack techniques. It was released in conjunction with the "Adaptive DLL Hijacking" blog post. I recommend you start there to contextualize this code.
This project is comprised of the following elements:
- Harness.exe: The "victim" application which is vulnerable to hijacking (static/dynamic)
- Functions.dll: The "real" library which exposes valid functionality to the harness
- Theif.dll: The "evil" library which is attempting to gain execution
- NetClone.exe: A C# application which will clone exports from one DLL to another
- PyClone.py: A python 3 script which mimics NetClone functionality
The VS solution itself supports 4 build configurations which map to 4 different methods of proxying functionality. This should provide a nice scalable way of demonstrating more techniques in the future.
- Stc-Forward: Forwards export names during the build process using linker comments
- Dyn-NetClone: Clones the export table from functions.dll onto theif.dll post-build using NetClone
- Dyn-PyClone: Clones the export table from functions.dll onto theif.dll post-build using PyClone
- Dyn-Rebuild: Rebuilds the export table and patches linked import tables post-load to dynamically prepare for function proxying
The goal of each technique is to successfully capture code execution while proxying functionality to the legitimate DLL. Each technique is tested to ensure static and dynamic sink situations are handled. This is by far not every primitive or technique variation. The post above goes into more detail.
Prepare a hijack scenario with an obviously incorrect DLL
> copy C:\windows\system32\whoami.exe .\whoami.exe
1 file(s) copied.
> copy C:\windows\system32\kernel32.dll .\wkscli.dll
1 file(s) copied.
Executing in the current configuration should result in an error
> whoami.exe
"Entry Point Not Found"
Convert kernel32 to proxy functionality for wkscli
> NetClone.exe --target C:\windows\system32\kernel32.dll --reference C:\windows\system32\wkscli.dll --output wkscli.dll
[+] Done.
> whoami.exe
COMPUTER\User
- Hack Tools For Games
- Pentest Tools Online
- Hacking Tools For Beginners
- Pentest Tools Online
- Pentest Tools
- Best Hacking Tools 2019
- Hack Tools Mac
- Growth Hacker Tools
- Pentest Tools Apk
- Best Hacking Tools 2020
- Hack Tools 2019
- Pentest Tools Download
- Pentest Tools Kali Linux
- Hacker Tools 2019
- Beginner Hacker Tools
- Hack Website Online Tool
- Top Pentest Tools
- What Is Hacking Tools
- Pentest Tools Tcp Port Scanner
- New Hacker Tools
- Best Hacking Tools 2019
- Hack Tools Download
- Pentest Tools Review
- Pentest Tools Url Fuzzer
- Hack Tools For Ubuntu
- Hack Website Online Tool
- Ethical Hacker Tools
- New Hacker Tools
- Underground Hacker Sites
- Hacking Tools Kit
- Hacking App
- Hackers Toolbox
- Hacking Tools For Beginners
- How To Make Hacking Tools
- Hacker Techniques Tools And Incident Handling
- Wifi Hacker Tools For Windows
- Wifi Hacker Tools For Windows
- Hacker Tools Apk
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Free
- World No 1 Hacker Software
- Pentest Tools List
- Pentest Tools
- Usb Pentest Tools
- Hack Tools Download
- Pentest Tools Framework
- Pentest Tools Online
- Pentest Tools Port Scanner
- Hacking Tools For Windows 7
- Pentest Tools Website
- Hack Tool Apk No Root
- Hacking Tools For Mac
- Pentest Tools Open Source

Nenhum comentário:
Postar um comentário